Enterprise-ready secrets management provides automatic processes for creating, storing, rotating, and removing secrets. Reduce the potential for human error and consistently enforce security policies across your organization with:
CipherTrust Secrets Management (CSM) is a state-of-the-art Secrets Management solution, powered by the Akeyless, which protects and automates access to secrets across DevOps tools and cloud workloads including secrets, credentials, certificates, API keys, and tokens.
Learn why in the KuppingerCole Leadership Compass on Enterprise Secrets Management, 2025.
CipherTrust Secrets Management powered by Akeyless easily integrates with other third-party applications such as:
We are pleased to meet our customers growing business needs by offering a single data security platform that can simplify the management of all their sensitive data, improve security and compliance, foster development collaboration, and scale their security infrastructure.
Secure your secrets, certificates, keys and more with a simpler approach to secrets management.
With no vaults to install, maintain or add, reduce the cost and complexity of secrets management.
Secrets are mission-critical credentials, certificates and keys. These include static secrets, dynamic secrets, SSH keys, API keys and tokens. Top uses cases are:
CSM is accessible from the CipherTrust Manager dashboard via a tile using the same credentials used to access CipherTrust Manager. This makes getting started with CSM quick and effortless. Just click on the Secrets Management tile, pick the configuration you wish to work with, and you are all set to have control over your secrets!
CSM works in hybrid, multi-cloud (all clouds), multi-tenants, on-premises and legacy systems via human or machine access. Third party integrations are also available with GitHub, Kubernetes, OpenShift and more.
CSM is a separate license purchase from CipherTrust Manager and can be used independently or in combination with a CM license for multifaceted protection for secrets. Both are managed through the central user interface within CipherTrust Manager.